Email is arguably the world’s best and worst advance in human communications. The ability to send and receive information with ease and speed results in a love-hate relationship with our inbox.

But the annoyance of an overflowing inbox pales in comparison to the dark side of email: phishing scams.

What is phishing?

Phishing emails look authentic but are sent by crooks seeking personal information. When successful, they use it to steal your identity and empty your bank account. Both individuals and businesses are vulnerable targets of such scams. The messages appear to be from reputable sources, such as a bank, a law enforcement agency or even the IT department where you work.

Below we summarize the three basic types of phishing. Each type targets a different group of users. But the goal of each is to steal personal and business information.

Spear Phishing targets a particular individual or company and attempts to gather information about the intended victim. This style accounts for the majority of phishing attempts.

Clone Phishing uses a legitimate, previously delivered email message and creates a nearly identical one. However, the clone includes malicious links or attachments. The victim will likely trust the bogus sender based on previous legitimate email correspondence.

Whaling specifically targets senior officers or high-profile employees in an organization. The phony email communication is created to fit the target’s role in the company. It could include a subpoena, a customer complaint or an issue needing the attention of an executive.

Identifying Phishing Emails

As convincing as phishing emails can be, there are ways to help recognize them. Below are seven things to look for that will help detect phishing emails.

Look at the sender’s email address. Using a falsified email address is one of the most common tactics used by cybercriminals. The address may appear to be coming from a reputable domain. For example, an email may seem to be from Citibank or PayPal. However, upon close inspection, it’s from citibank@lake.ocn.ne.jp.” Rest assured that Citibank won’t use the “lake.ocn.ne.jp” domain for their email communications.

Beware of errors in spelling and grammar. We all make them, of course. But employees of major organizations must adhere to proper rules of the English language. Watch for emails from major banks, corporations or government agencies that contain awkward use of language. English is the second language of many con artists.

Look closely at the greeting and signature. How does the sender of the email address you in the salutation? Is it “Dearest Customer,” “My Dear,” “Dear Anne Jones” or another other oddly-phrased greeting? You bank would not address you that way, especially if you’ve had prior communication with someone there.

Likewise, a lack of information included in the sender’s email signature is cause for concern. A legitimate representative of a company will always provide contact information in their signature. But again, look at the email address. No bank officer, insurance agent or medical facility will use a Gmail or Yahoo email for official communication.

Don’t click on embedded links. The full text of a link typically displays if you hover the pointer over a link embedded in an email. Alternatively, right-click on the link, copy it and paste it into a text file to assess its legitimacy. Shortened and malformed links may appear to be sending victims to a legitimate website. But victims actually land at a rogue website that attempts to trick them into providing login credentials or other personal information. Another risk in clicking such links is ransomware, which we discuss here.

Some of these illegitimate websites claim a security breach or other emergency occurred. Victims are asked to give Open Authentication (OAuth) access to their email, bank account or other online account(s). Phishers then use that information to access an account as if it were their own.

OAuth is actually a legitimate and convenient method of authorizing third-party apps to use an account for social media, gaming, etc. Once granted, you don’t have to enter your login information each time you access the app. However, criminals use OAuth to create havoc.

Don’t open attachments. Cybercriminals really enjoy including attachments in phishing emails. They typically appear as PDFs, JPEGs or MS Word documents. Unfortunately, they might contain malware or viruses. These bugs can damage files on your computer, seize administrator status to make changes, steal passwords or spy on your movements across the Internet.

Guard your personal information. Banks, credit card companies, schools and other institutions never ask for personal information by email. Period. Report such requests to a customer service agent by phone if you receive such a request. They need to know they’re being used to cover a scam.

Beware of urgent or threatening deadlines. Be skeptical of any email with a subject line claiming your immediate attention is needed. The same goes for anyone claiming your account is frozen or that an unauthorized login was detected on your account. These emails almost always include an embedded link for you to follow. Rather than landing on a helpful page, you took the first step toward a security breach and stolen identity.

The bottom line

Following these simple tips protects you from time consuming and expensive mistakes. And notice how many different types of scams that you’ll now recognize in your inbox on a regular basis.

]]>10839Active Shooters and Businesses: Risk Management and Insurancehttps://www.sadlerco.com/active-shooters-risk-management/
Wed, 20 Dec 2017 15:36:42 +0000https://www.sadlerco.com/?p=10832Training and risk management are key in the event of an incident In the wake of the Las Vegas shooting incident, special events coordinators are stepping up their risk management protocols. Such violence represents the potential for personal and property

In the wake of the Las Vegas shooting incident, special events coordinators are stepping up their risk management protocols. Such violence represents the potential for personal and property losses in the business sector as well.

Business owners and their employees must recognize the importance of training and tactics to minimize exposures to this emerging threat and maximize survival of those involved.

After the 2012 Sandy Hook Elementary School shooting, the FBI, the Department of Homeland Security and several other federal agencies created the Run. Hide. Fight. strategy. This civilian training aims to enhance preparedness through a whole community approach. It provides products, tools, and resources that can help you prepare for and respond to an active shooter incident.

Don’t think it can’t happen in your community

It’s critical for the business community to recognize the potential for an active shooter situation and need for prevention training. The FBI reports that businesses were the most frequent target or venue of 160 such shooting events between 2000 and 2013.

Much of the training is common sense. For example, intruders always take the path of least resistance and move on to an unblocked or unfortified room or area. Training provides the opportunity to recognize such vulnerabilities in your place of business and thwart an intruder.

Your ability to identify certain behaviors that often precede or signal the onset of an event is also critical. Know your employees, vendors, customers and neighboring businesses. Oftentimes shooters exhibit a change in behavior prior to taking violent action. This can often be observed in social media posts.

It’s important that everyone in the business is on board. Establish a formal program that includes a reporting and tracking system for all security incidents. We can’t stress enough the importance of reporting and documentation. For the training to be successful, it has to be repeated. And repeated. And repeated again.

Your business faces potential liabilities

Businesses can be found liable for injuries and damages for failure to take risk management steps to prevent or minimize an active shooter event. Also take into account the extreme property damage or loss of income and reputation that can result. Stand-alone policy forms for Active Shooter Insurance have recently been developed and are available for surprisingly low premiums. Perhaps one of the major benefits of such insurance is the risk management training that comes with the purchase of the insurance.

Please contact Sadler & Company by completing the contact us form or call 800-622-7370 if you have any questions.

]]>10832Is a Flood of Sexual Harassment Litigation About to Hit Small Business?https://www.sadlerco.com/sexual-harassment-litigation-business/
Mon, 11 Dec 2017 18:39:52 +0000https://www.sadlerco.com/?p=10823Allegations will soon surface in businesses of every size in every industry No industry is immune from the types of sexual harassment complaints currently piling up against entertainment celebrities and political figures. It’s quite clear that women in the workforce

]]>Allegations will soon surface in businesses of every size in every industry

No industry is immune from the types of sexual harassment complaints currently piling up against entertainment celebrities and political figures. It’s quite clear that women in the workforce are no longer willing to tolerate a culture of sexual intimidation.

The high-profile allegations against such heavy hitters as Harvey Weinstein, Matt Lauer and Sen. John Conyers are giving women in other industries the courage to come forward, too. There will undoubtedly be trickle down from these high-profile cases into smaller businesses.

Ironically, the harassment allegations appearing in almost daily news reports defy a recent trend. There has been a continual decline since 2010 in the number of sexual harassment charges filed with the Equal Employment Opportunity Commission.

Leaders set the tone

Reducing the potential for incidents of sexual harassment in your company begins at the top. Other executives at Harvey Weinstein’s company and NBC’s Today Show had to know what was going on, whether directly or through rumors. There’s ample reason to believe that the ostrich syndrome is a significant problem in the upper management of many companies.

Your star employees who meet financial goals or grow your business cannot be immune from the consequences of unacceptable behavior. Business owners and board members need to know they may be held personally liable for claims of sexual harassment against their employees. And private organizations can be sued by shareholders and others.

One red flag board members need to recognize is large or unusual checks going out. Is someone being paid to keep silent? If a satisfactory answer isn’t forthcoming, investigate the issue further.

Setting up a sexually safe workplace

The first step is to recognize the cultural issue of predatory advances, especially the intimidation factor. Take rumors and allegations seriously. The message must be clear that inappropriate behavior in the work environment won’t be tolerated.

Create a well-defined written sexual harassment policy that includes procedures for complaints and investigations. Make it clear that the policy pertains to all employees, including company leaders. Strict enforcement of the policy and procedures drastically reduce the potential of sexual harassment claims.

All employees need training in accepted behavior and the policies and procedures you establish.

Some businesses might want to consider adopting Vice President Mike Pence’s personal policy. He never dines alone with a woman or attends an event where alcohol is served unless accompanied by his wife.

Unfortunately, negative fallout could result from these recent celebrity cases. False allegations are always a concern. Fear of misinterpreted behavior or false allegations might result in men being less willing to mentor or work one-on-one with women. But many of these mentoring meetings take place outside the workplace, in environments ripe for unwanted advances and away from observers.

One more element of protection

An Employment Practices Liability insurance policy is a must. These policies are affordable and protect against allegations of employment-based discrimination based on race, sex, age or handicap, sexual harassment and wrongful termination or discipline. An EPLI policy can be purchased either on a stand alone basis or combined with a Management Liability policy (ADA Directors & Officers Liability policy).

Please contact Sadler & Company if you are interested in a quote by completing the get quote form or calling our commercial insurance department at 800-622-7370.

]]>10823Exercise Ball Seating and Standing Desks Falling Out of Favorhttps://www.sadlerco.com/office-ergonomics/
Wed, 11 Oct 2017 19:13:24 +0000https://www.sadlerco.com/?p=10812Keeping employees physically comfortable at work Do your employees spend long periods of time standing or sitting? Maybe your work environment is pretty hip and encourages casual seating, standing desks, and the occasional power nap? Whatever the case, it’s important

Do your employees spend long periods of time standing or sitting? Maybe your work environment is pretty hip and encourages casual seating, standing desks, and the occasional power nap? Whatever the case, it’s important you minimize the risks of injury with proper ergonomics.

Proper Seating

For workers who spend a good portion of their day seated at a desk, the right chair is a must. First and foremost, the chair should be comfortable. Encourage the use of a pillow to support the lower back and prevent slouching. Stools, exercise balls, and other non-standard seating don’t offer sufficient back support. Characteristics of a properly ergonomic chair include:

Pneumatic height adjustment

Adjustable lumbar support

Adjustable seat pan

A seat back that can be locked in an upright position or inclined to 110 degrees

Adjustable padded armrests

Five-caster base and casters suited for your flooring surface

Exercise Balls

Yes, they’re fun and keep you moving in a sedentary environment, but what about back support? A lack of back support when seated for extended periods causes the back muscles to contract, which compresses the discs. Results from a Cornell University study show that exercise balls can help with strengthening the core muscles, but they don’t provide the necessary back support. Exercise balls are not recommended as a substitute for proper ergonomic seating in the office setting.

Standing Desks

You may have heard thatsitting is the new smoking, a reference to our sedentary lifestyle and how it affects our health. To combat this, many office workers use standing desks. But is standing for long periods the answer?

There are benefits if the standing workstation is properly designed. But there are risks involved in using a improperly-designed standing desk.

Height is important; too high leads to raised elbows and too low results in stooped posture. Prolonged standing is linked to poor circulation and discomfort in the feet and lower back. Additional risks include unsupported back, leaning and reaching. A fixed posture, hard floor and even unsupportive shoes can contribute to pain and injury.

The bottom line on standing desks is that they need to accommodate the employee’s seated and standing height. Make sure users are knowledgeable of neutral postures, appropriate footwear and the risk factors associated with prolonged sitting and standing.

Whether seated or standing

Ergonomic rules of thumb no matter how an employee chooses to work at desk are:

]]>108126 Must-have Insurance Policies Needed to Protect Your Small Businesshttps://www.sadlerco.com/6-insurance-policies-needed-small-business/
Fri, 22 Sep 2017 21:44:36 +0000https://www.sadlerco.com/?p=10796The policies you need and why you need them Business Owners Policy Every business is susceptible to damage, loss and lawsuits, any of which can cost you dearly. A BOP policy includes General Liability and Property insurance. Without protection, just

Every business is susceptible to damage, loss and lawsuits, any of which can cost you dearly. A BOP policy includes General Liability and Property insurance. Without protection, just one incident ending in an injury or a property damage lawsuit could bankrupt your business. Many business agreements with other entities require proof of General Liability coverage. General Liability protects your assets by covering events such as:

This policy is also known as Errors & Omissions. Providers of professional services have a great responsibility toward their clients. Traditionally, only attorneys, medical professionals, CPAs, consultants, and engineers purchased this type of coverage. However, any business offering professional services is at risk to exposures that require this type of coverage. Any failure to perform professional services that results in economic damages to a client triggers this coverage. And remember, pure economic damages without accompanying bodily injury or property damage isn’t covered by a General Liability policy.

This type of policy covers expenses incurred when an employee or uninsured subcontractor is injured at work or suffers a work-related illness on or off the premises. These include medical costs, lost wages, and certain lump-sum damages. It’s especially relevant to note most states require employers carry Worker’s Compensation. Of course, the organizations incur penalties if they fail to meet the requirement.

We hear news reports of data breaches almost daily and no business is immune. The damage to your business and its reputation can be costly when your customers’ personal and financial information is compromised. Cyber Risk insurance helps you manage the cost of repairing the breach and compensating your customers.

Whether you and your employees drive company-owned cars or personal vehicles for business purposes, you need Business Auto insurance. The risk of an auto accident is ever-present and injuries can result in costly medical bills — costly enough to bankrupt a small business. In addition, Business Auto insurance covers damage to property in the vehicle.

No employer wants to think about employees stealing, embezzling, hacking or forging signatures. Nonetheless, it happens more than anyone wants to admit. Sadly, it’s typically the most trusted workers committing such crimes. Crime insurance covers the loss of property and money by dishonest employees.

Is your business fully covered? Let us help you determine that. Need more information or want a quote? Call us at 800-622-7370 or contact us online.

Summer and fall are the most popular seasons for special events like outdoor festivals, concerts, and sports tournaments. Many employers, non-profits and recreation organization host picnics and fundraisers that involve outdoor activities.

But they aren’t always all fun and games for everyone involved. Accidents and other unexpected events can occur, and the organizer(s) and vendors can be held liable. Special Events insurance is the best way to protect your organization and those involved.

Slip-and-fall accidents are the most common mishaps that result in claims. Damages to rented facilities, such as tents, and audio equipment are also common claims. Anytime food and/or alcohol is served the risk level rises significantly.

In the past, large event promoters covered everyone involved with the event under a single policy. However,a tragic incident in 2011 at a state fair changed this thinking. Now, most promoters require individual vendors, stage crews, lighting and electrical crews, etc. to carry special event insurance.

Types of coverage available

The main type of insurance promoters and vendors need is General Liability. Accident medical coverage for event participants and volunteers, weather, event cancellation, fireworks liability, and active assailant or terrorism are additional coverages to consider.

It’s interesting to note that many standard Special Event insurance policies protect against sexual abuse/molestation. This covers claims alleging inappropriate sexual behavior by an event employee or volunteer.

A Liquor Liability policy is the best defense against any claims of bodily injury or property damage caused by inebriated participants.

Unfortunately, terrorism is a very real risk. Sadly, some insurance carriers won’t write a Special Event policy for events taking place in large cities such as New York and Boston. And yet, K&K Insurance Group decided to include terrorism coverage in all their quotes, according to Stephanie Waldron, a senior vice president.

Make insurance part of your event planning

Special events, even smaller ones, are planned well in advance. Nonetheless, many organizers wait until the last minute to shop for coverage. This can make it difficult for an underwriter to collect the necessary information and provide a quote for the best coverage.

However, organizers of smaller events with limited risks can take advantage of online platforms. These are typically family reunions, art exhibitions, and meetings.

Crime show fans know that cops are always able to verify alibis by reviewing phone records. Cell phone activity registers pings on the nearest tower, which proves whether suspects were where they claimed to be when the crime was committed. And since TV criminals always make calls or send texts while committing their crimes this is a failsafe method of getting a conviction.

This same general principle is now being applied to users of wearable technology. Wearable technology is sensored devices that are connected wirelessly through a web or Bluetooth connection. Fitbits, smartwatches and safety monitors for seniors are currently among the most widely used. They can be used to track the wearer’s location, activity level, health and much more.

Not surprisingly, the information in some of these devices is now serving as valuable evidence In both civil and criminal litigation.

Examples of actual cases

In a Pennsylvania rape case, the victim claimed to be at home in bed when the attack took place. However, her Fitbit data showed she took approximately 1,000 steps between the the time she said she went to bed and when she called 911. Alleging she staged the crime scene, police charged her with filing a false report and tampering with evidence.

An Ohio man’s house caught fire. He claimed he packed up some bags and escaped through a window he broke open. He also mentioned that he wore a pacemaker. Arson investigators, suspicious due to traces of gasoline at the scene, checked his heart monitor data. A cardiologist read the data and supplied key evidence in the case: that the man’s story was unlikely due to his medical condition and cardiac rhythms before, during and after the fire.

A personal trainer in Canada suffered injuries in an accident before fitness trackers were common. Four years after the accident, her lawyers outfitted her with a Fitbit to monitor her current level of activity. The lawyers gave the data to an analytics company to compare her activity with that of the general population. This will determine whether her level of activity falls above or below that of the average person. Her lawyers hope the data will support their client’s claim that her current activity is below average due to her injury.

Wearable technology in personal injury cases

Let’s look at example #2 above in which a party is claiming that an injury prevents them from being as active as in the past. The user’s data from a fitness or activity-tracking device is relevant evidence. But the legal community hasn’t yet caught up with advancements in technology. The biggest obstacle in using such data as evidence will likely be objections based on right to privacy. The victim’s attorneys will want to avoid a fishing expedition by the defense team.

Another issue could be in proving the data is accurate. Fitbit’s heart rate accuracy is currently being debated. Apple knows the heart rate data on its smartwatch is flawed, particularly when immersed in water, as when user’s are swimming. Irregular movements often result in miscommunication to the device. And readings may be inaccurate if the LED lights on the back panel are blocked by a tattoo, matted hair, or large skin irregularity.

Wearable technology in the workplace

Wearable technology devices are being used in the workplace by many employers and insurance companies in an effort to reduce workplace injuries. Some health insurance companies offer discounts when wearable technology data is submit as evidence of a healthy and active lifestyle.We may one day see invasion-of-privacy claims surpass wrongful termination as the most frequent workplace complaint. Use of this new technology in the work environment is raising potential privacy-in-the-workplace issues. Below are two examples of areas where problems can arise.

Confidentiality. Health information of employees collected to confirm their capability to execute the job is, by law, to be kept confidential. If the information is leaked either by a hacker or another employee, the employer can be held liable.

Off-the-Clock Monitoring. Employers may not monitor their employees during off-work hours. Nor can they terminate employees engaged in legal activities, such as political demonstrations or campaigns.

Looking ahead

There are obviously many benefits to wearable technology. The key is responsible use of the data. It’s an evolving technology that’s just in its infancy. We’ll see if the legal community can keep pace with technological advancements.

]]>10768Liquor Liability Laws for Restaurants/Bars and Other Servershttps://www.sadlerco.com/liquor-liability-laws/
Tue, 01 Aug 2017 17:56:44 +0000https://www.sadlerco.com/?p=10763State laws may clarify what owners should already be doing Liquor liability laws vary from state to state. Their basic premise is that businesses selling alcohol to visibly intoxicated persons or minors can be held liable if the consumer later

Liquor liability laws vary from state to state. Their basic premise is that businesses selling alcohol to visibly intoxicated persons or minors can be held liable if the consumer later causes death or injury to third parties as a result of intoxication. These laws (AKA dram shop laws in some states) are an incentive for alcohol-vending businesses to consider possible consequences to the public, such as a drunk driving accidents.

Most states require restaurants, stores and other businesses providing alcoholic beverages to carry Liquor Liability Insurance. But just as the laws themselves vary, so do insurance coverage requirements — if they even exist.

South Carolina recently eliminated much of its confusion by passing a new law. Businesses that serve alcohol after 5 p.m. are now required to carry a minimum of $1 million in Liquor Liability Insurance. Without it, they can’t obtain or renew their liquor license.

Most establishments in South Carolina already have Liquor Liability Insurance. They may simply need to adjust the amount to comply with the new law. To carry less than $1 million would be irresponsible given the high-risk nature of the business, said one Charleston restaurant owner.

Calculating the cost

It’s important that businesses selling liquor think of Liquor Liability Insurance the same way they do auto insurance. Anyone owning a vehicle must have it insured in order to operate it.

Liquor Liability Insurance can range in cost. Factors taken into account by the insurance carriers include the types of alcohol being sold, if the business has a dance floor, or if it employs bouncers.

But the most significant factor is the liquor-sales to food-sales ratio.

The insurance rate is higher when liquor sales are more than 35 percent of a business’s gross food and liquor sales. So if its gross liquor sales are 30 percent of its total gross sales of $1.5 million, the cost of Liquor Liability Insurance insurance would be $3000. But if gross liquor sales are 50 percent or higher on the same total sales, it would pay $4500.

What state laws do to protect innocent third parties

As stated above, liquor insurance laws are enacted to keep businesses accountable. Injured parties can sue, of course. But what’s the point if the business doesn’t have sufficient assets, either money or property, to compensate the victims?

Setting a $1 million minimum on insurance coverage assures victims of compensation. However, that might not be enough, according to personal injury attorney David Lail. Medical costs, lost wages, punitive damages and other costs involved in a personal injury case often exceed $3 million.

One way lower the risk of liability is to train servers and bartenders on intoxication prevention and intervention. Another is checking identification, serving water between drinks, knowing the signs of intoxication can all go a long way in avoiding a tragic accident. There’s typically a discount if all employees hold TIPS certification.

How to get a Liquor Liability insurance quote for your business

Contact our commercial department by completing our web form or by calling 800-622-7370. We generally write Liquor Liability along with General Liability and Property. Most carriers require that risk management controls are in place, such as TIPS certification.

]]>10763What Should You Do If You’re a Victim of a Ransomware Attack?https://www.sadlerco.com/victim-ransomware-attack/
Mon, 24 Jul 2017 12:03:17 +0000https://www.sadlerco.com/?p=10744Understanding, surviving, and minimizing your risk of cyber extortion We all fear the blue screen of death signaling a fatal system error. Operating computers can be frustrating at the best of times, but we’re sunk when they don’t work at

We all fear the blue screen of death signaling a fatal system error. Operating computers can be frustrating at the best of times, but we’re sunk when they don’t work at all.

The only thing more crippling is booting up your computer only to see a skull projected on the monitor pronouncing your files were hijacked for ransom. So in addition to not being able to access your files, you also have a huge financial problem to contend with.

Yes, you’re allowed to take a few minutes to panic if this happens to you.

What just happened?

The ransom warning on your screen informs you that your files can only be released using a decryption key. This key, which is stored on a secret server, will be automatically deleted if you don’t pay the ransom within the timeframe indicated.

The malware holding your files hostage may have found its way to you in an email attachment. Or, it could have been embedded in an image or file you clicked on. Or maybe you downloaded it with a document or program from a less than trustworthy source. However it got there, the code encrypted your data and has the ability to corrupt or destroy it if you don’t make timely payment.

Don’t think this can’t happen to you. Insurers report a 300% increase in ransomware attacks from 2015 to 2016, and they’re expected to double in 2017.

Should you pay?

One of your first questions will be, “What if I pay but my files aren’t released?” That probably won’t happen.

History shows that hackers do restore the data once the ransom is paid. Why? Because hackers are smart enough realize that if they don’t release the data then future victims have no motivation to pay.

Economics will probably drive the answer to your question of whether to pay or not. The cost over time of employing other options to restore your data will likely be much more than the ransom the hijackers are demanding.

Cyber extortion is becoming increasingly sophisticated

Ransomware attacks began taking place in the 1980s. Hackers typically demanded payment by credit card and used that information to go on a spending sprees. A few years later, some hijackers began demanding payment in the form of iTunes gift cards. Today it’s not unusual for them to demand payment in bitcoin, a digital currency used independently of the banking system.

A fairly new extortion tactic is to demand the victim’s cache of email contacts. The criminals will only release the files if two or more of the contacts respond by paying the ransom.

Criminals sometimes go a step further by capturing confidential or personally compromising files, which they threaten to release publicly if payment isn’t made.

Thinking ahead and employing risk management techniques

Cyber criminals always seem to be one step ahead of the rest of us, so there’s no failsafe method of preventing a cyber attack. But there are steps you can take to minimize your risk.

Consult with a computer security expert about specific risk management strategies you can employ.

Update your operating system and all software on a regular basis.

Take advantage of email spam filters and pop-up blockers for your Internet browser.

My last tip is that you buy cyber insurance. The prices for Cyber Risk insurance have dropped dramatically. We offer a Cyber Risk policy with a $1,000,000 limit for cyber extortion for as little as $750. It’s fast and easy to get a quote: it only takes a few minutes for you to provide the necessary information and we can provide a quote within an hour! Call us at 800-622-7370 and ask for our commercial department.

]]>107444 Common Mistakes Automobile Accident Victims Makehttps://www.sadlerco.com/4-mistakes-accident-victims-make/
Thu, 06 Jul 2017 16:43:17 +0000https://www.sadlerco.com/?p=10737Decisions made following an accident can have long-term consequences It’s bad enough when you or one of your family members is involved in an auto accident. Getting through the paperwork, dealing with the insurance companies and possibly recovering from injuries

]]>Decisions made following an accident can have long-term consequences

It’s bad enough when you or one of your family members is involved in an auto accident. Getting through the paperwork, dealing with the insurance companies and possibly recovering from injuries isn’t just time consuming, it’s a huge distraction from your work.

In the aftermath of an accident, too many victims make mistakes that can have far reaching effects. This is especially true if the other party is at fault and you are dealing with their claims adjuster. The good news is, you can easily avoid making the four most common ones:

1. Minimizing Injuries

If you’ve ever started a new exercise program, you know you’ll be aching the next day – or the next. It’s no different after an automobile accident. Drivers are often unaware they’ve been injured at all until a day or two has passed and they feel the effects.

Even if a visit to the emergency department isn’t necessary following the accident, we recommend you get evaluated by a physician. Your doctor can order diagnostic tests, prescribe medications, and refer you to orthopedic or neurological specialists if necessary. He or she may even recommend massage therapy, chiropractic care, and/or physical therapy.

This visit and any referral and follow-up appointments are your way of documenting your injuries and the treatments you receive.

2. Talking to the Wrong People

As if just being in an accident isn’t annoying enough, now you’ll be making and receiving phone calls from various people about insurance, medical appointments, car repairs, etc.

You might feel pressured by calls and requests to provide information from the other party’s claims adjuster. Don’t give in to phrases you might hear such as “we can wrap this up quickly.” (See point #3.)

If you believe the other party’s claims adjuster isn’t treating you fairly or is requesting information that seems inappropriate, seek advice from your insurance agent.

3. Settling in a Hurry

There is no reason for anyone to pressure you to settle your claims quickly. The injuries you considered minor could later cause more discomfort and pain many days or even weeks after the event. Some soft tissue injuries may not immediately respond to treatment. Or recuperation from more serious injuries may not be progressing as expected and need re-assessed. Settling too quickly means you could be left paying for ongoing medical expenses that insurance would have covered.

4. Minimizing Damage to the Auto

A fender bender that leaves little surface damage could in fact result in a shift in alignment, a bent frame, or other damage that only becomes evident later. Low-speed collisions when bumpers don’t line up typically produce extensive damage requiring expensive repairs, according to the Insurance Institute for Highway Safety. A certified technician should check for problems that might not be obvious but make the vehicle unsafe to drive. The last thing you need is to be involved in another accident.

In addition, damage to your vehicle will likely result in its reduced resale value once the accident is picked up by the reporting services. You should ask for this to be taken into account by the claims adjuster.

Source: Cynthia Carels.“Four Common Mistakes Made By Accident Injury Victims,”www.lexology.com. 20 June 2017.